论文部分内容阅读
在车载自组网中,攻击者通过伪造、偷窃以及与其他合法车辆合谋等方式获得多个网络身份,并利用这些身份发布虚假交通信息来伪造交通场景,从而造成交通拥堵,甚至引发更严重的交通事故。现有的多数Sybil攻击检测方案主要检测伪造身份或偷窃身份的Sybil攻击,很少有检测方案针对合谋Sybil攻击进行研究。另外,检测Sybil攻击需要确保车辆实体在网络通信时仅绑定一个网络身份以防止攻击者扮演多个身份来欺骗其他车辆,这种做法会造成车辆隐私的泄露。为了平衡解决Sybil攻击检测和隐私保护这两个相互矛盾的问题,本文提出了一种基于时空分析的抗合谋Sybil攻击检测方法STARCS(Spatio-Temporal Analysis based Resist Conspiracy Sybil Attack)。该方法利用匿名RSU发布的时间戳标识作为车辆在车载自组网中的身份,通过权威机构TA(Trust Authority)设置的请求信息表记录前一次经过的RSU和时间戳,从而抵御伪造Sybil身份和合谋Sybil身份的产生。文中每个警报事件只允许每个车辆发布一次带有时间戳标识的警报消息,根据警报信息中包含的标识是否被多个车辆同时使用来检测攻击者与合谋车辆同时使用同一身份的合谋Sybil攻击,并依据标识中嵌入的RSU位置关系标签检测攻击者与远距离车辆合谋的Sybil攻击。由于从时间上身份是否被滥用和空间上身份是否出现不合理位移的情况来检测合谋Sybil攻击,即从时空关系上抵制和检测合谋Sybil攻击。理论分析和仿真实验表明,本方法不仅能够抵御或检测多种Sybil攻击,而且具有较少的时间开销和通信开销,并通过动态匿名机制保护车辆的身份和位置隐私。
In vehicle ad hoc networks, attackers gain multiple network identities through forgery, theft, and collusion with other legitimate vehicles, and use these identities to issue fake traffic information to fake traffic scenarios, causing traffic jams and even more serious Traffic accident. Most existing Sybil attack detection schemes mainly detect Sybil attacks that forge identities or steal identities. Few detection schemes study the collusion Sybil attacks. In addition, detecting Sybil attacks requires ensuring that vehicle entities only bind one network identity during network communications to prevent attackers from acting as multiple identities to deceive other vehicles, a practice that can result in the disclosure of vehicle privacy. In order to balance the two contradictory problems of Sybil attack detection and privacy protection, this paper proposes a Spatio-Temporal Analysis based Resist Conspiracy Sybil Attack (STARCS) based on spatio-temporal analysis. The method uses the timestamp identification issued by anonymous RSU as the identity of the vehicle in the vehicular ad hoc network and records the RSU and timestamp passed last time through the request information table set by the authority authority (TAA), so as to defeat the forgery of Sybil identity and Collusion Sybil identity generation. In this paper, each alarm event only allows each vehicle to issue an alarm message with a timestamp identifier. Based on whether the identifier contained in the alarm message is used by multiple vehicles at the same time, an attacker can detect the collusion with a conspiratorial vehicle using the same identity and collusion Sybil attack And detects the Sybil attack that the attacker conspired with the long range vehicle based on the RSU location relationship tag embedded in the ID. Syndict Sybil attacks are detected due to the misuse of identities over time and the irrational movement of spatially identifiable identities, ie, resistance and detection of collusive Sybil attacks from a spatiotemporal relationship. Theoretical analysis and simulation results show that this method not only can resist or detect many kinds of Sybil attacks, but also has less time and communication overhead and protects the identity and location privacy of vehicles through dynamic anonymity mechanism.